网站首页  软件下载  游戏下载  翻译软件  电子书下载  电影下载  电视剧下载  教程攻略

请输入您要查询的图书:

 

书名 边缘计算雾计算研究与应用(英文版)
分类 科学技术-工业科技-电子通讯
作者 林福宏
出版社 西南交通大学出版社
下载
简介
内容推荐
本书是学术著作,主要介绍边缘计算/雾计算领域关键技术的最新研究成果,主要论述三方面内容:边缘计算/雾计算资源分配研究,包括资源优化备份、带宽优化分配、基于众筹的资源激励、资源调度、资源优化分配等;边缘计算/雾计算安全研究,包括基于微分博弈的安全模型构建、基于Skyline的入侵检测、基于超图理论的密钥管理等;边缘计算/雾计算应用研究,包括边缘计算在图像处理中的应用研究、边缘计算在车联网中的应用研究等。本书适合IT领域云计算,边缘计算/雾计算等专业的读者使用,也可作为高校相关专业研究生教材和参考用书。
目录
PART I: Resource Management in Edge & Fog Computing
1 Steiner Tree based Optimal Resource Caching Scheme in Fog Computing
1.1 Introduction
1.2 Related work
1.3 Problem formulation
1.4 Algorithm design
1.5 Running illustration
1.6 Numerical simulation
1.7 Conclusion
References
2 Hypergraph Based Radio Resource Management in 5G Fog Cell
2.1 Introduction
2.2 Related work
2.3 Network architecture of fog computing in 5G
2.4 Radio resource management ofhypergraph partitioning in 5G Fog Cell
2.4.1 Task model
2.4.2 Hyperoraph model o(5G Fo9 Cell resource pool
2.4.3 Hypergraph cluster and resource allocation
2.5 Numerical simulation
2.6 Conclusion
References
3 Differential Game Based Model for the Transmission of Malware in Fog Computing
3.1 Introduction
3.2 Related work
3.3 Malware propagation model in fog computing
3.4 Optimal security patch strategies in fog computing based on differential game
3.5 Numerical simulation
3.5.1 Evolution of fog nodes under Best Static Strategy
3.5.2 Evolution of fog nodes under Dynamic Strategy
3.5.3 Optimal dynamic controls of fog computing system and malware
3.5.4 Overall cost comparison between static and dynamic optimal strategies
3.6 Conclusion
References
4 Survivability Optimization of Mobile Fog Computing Network via Bandwidth Allocation Management
4.1 Introduction
4.2 Related work
4.3 Bandwidth allocation model
4.4 Solutions to the bandwidth allocation model
4.5 Numerical simulation
4.6 Conclusion
References
5 Non-Cooperative Differential Game for Incentive to Contribute Resource-based Crowd funding in Fog Computing
5.1 Introduction
5.2 Related work
5.3 System model
5.3.1 Differential game model for crowd funding resource
5.3.2 Feedback Nash equilibrium solution
5.4 Numerical simulation
5.5 Conclusion
References
6 Genetic Algorithm-based Resource Scheduling Scheme in Fog Computing
6.1 Introduction
6.2 Fog computing architecture
6.3 Resource scheduling model in fog computing
6.3.1 Resource scheduling among fog clusters
6.3.2 Resource scheduling among nodes in the same fog cluster
6.4 Numerical simulation
6.5 Conclusion
References
7 Resource Sharing Model Based Repeated Game in Fog Computing
7.1 Introduction
7.2 Related work
7.3 Methods
7.3.1 Game model description
7.3.2 Game analysis
7.4 Numerical simulation
7.5 Conclusion
References
8 Fair Resource Allocation in Intrusion Detection System for Edge Computing
8.1 Introduction
8.2 Architecture ofvirtural security network model
8.3 IDS process of edge computing
8.4 Resources allocation process of IDS
8.5 Conclusion
References
PART II: Security Management in Edge & Fog Computing
9 Non-Cooperative Differential Game Based Security Model in Fog Computing
9.1 Introduction
9.2 Related work
9.3 System model
9.4 Feedback Nash Equilibrium solution
9.5 Numerical simulation
9.6 Conclusion
References
10 Skyline Based Node State Monitoring Scheme in Fog Computing for ntrusion Detection
10.1 Introduction
10.2 Related work
10.3 General IDS description and problem formulation
10.3.1 Fog computing IDS framework
10.3.2 Problem description
10.4 Node state monitoring scheme
10.4.1 Fo9 node filtering strategy (FNFS)
10.4.2 Cloud server sliding window mechanism
10.4.3 Fog node security threat measure calculation
10.5 Numerical simulation
10.6 Conclusion
References
11 Differential Game Model of Intrusion Detection System in Fog Computing
11.1 Introduction
11.2 Related work
11.3 Proble
随便看

 

霍普软件下载网电子书栏目提供海量电子书在线免费阅读及下载。

 

Copyright © 2002-2024 101bt.net All Rights Reserved
更新时间:2025/2/22 18:25:42